<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ietf-lwig-crypto-sensors" target="https://datatracker.ietf.org/doc/html/draft-ietf-lwig-crypto-sensors-02">
   <front>
      <title>Practical Considerations and Implementation Experiences in Securing Smart Object Networks</title>
      <author initials="M." surname="Sethi" fullname="Mohit Sethi">
         </author>
      <author initials="J." surname="Arkko" fullname="Jari Arkko">
         </author>
      <author initials="A." surname="Keränen" fullname="Ari Keränen">
         </author>
      <author initials="H." surname="Back" fullname="Heidi-Maria Back">
         </author>
      <date month="February" day="10" year="2017" />
      <abstract>
	 <t>   This memo describes challenges associated with securing smart object
   devices in constrained implementations and environments.  The memo
   describes a possible deployment model suitable for these
   environments, discusses the availability of cryptographic libraries
   for small devices, presents some preliminary experiences in
   implementing cryptography on small devices using those libraries, and
   discusses trade-offs involving different types of approaches.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lwig-crypto-sensors-02" />
   
</reference>
